What Do You Do for New User Orientation? 97
An anonymous reader asks: "What do you do for new user orientation? I started at a company as part of a very small help desk / MIS department. Part of my job is to give orientation to all new computer users for the entire company (no more than 10 new users a week). Right now I have to sit with each user, go over logging in, passwords, email, outlook, Microsoft Office, and so on. This takes between 30-45 minutes. What do other IT departments do? I was thinking of a Flash presentation or website, and maybe even a short orientation movie. What ideas have you tried and how well did they work?"
Swim or drown (Score:4, Interesting)
Re:Here's what I do (Score:2, Interesting)
Better would be a quick session to show users how to logon, and present them with a simple printed booklet to cover details. This has the double advantage of being much easier to maintain than a Flash presentation, as well as usually being easier to process mentally.
I know there are many who might throw up their hands in horror when I say this, but for all that Flash presentations might be very good for impressing nerds, they are not necessarily a good medium for conveying instructions.
Make them build their own desk or chair (Score:4, Interesting)
They were shown to their new spot, given the tools, and told that this was their first order of business. That was all.
Nearby employees were told to offer any and all assistance, but only if asked.
This worked on many levels. It was symbolic of the philosophy at the company. For some, it ended up being a "team-building" exercise, or a social ice-breaker. For others, it showed that they were clever and self reliant. Some folks couldn't get it done, and refused to ask for help. This almost always signified termination at their first opportunity. And the
Ask after religious preferences first (Score:3, Interesting)
To wit, PC vs. Mac vs. Linux. Mac users are also asked about how long they've been using them.
Next is setting up their accounts; this involves warning them of the minimum acceptable complexity allowed for passwords, showing them how to change their passwords to something marginally more memorable than the automatic preassigned random gibberish, and reminding them of the minimum requirements after the first password change attempt is rejected. I then tell them that neither I nor anyone else will ever ask for their password — if I or anyone in IT need access, we will change it, and tell them the new password afterward (so the user may change it back); anyone who asks for their password should be reported to me and to the central IT security number immediately as an attempt to breach security.
After that, I point out the selection of web browsers available on their workstation (IE/Firefox/Opera, additional options for the Mac), advocate Firefox for regular use, and direct them to the central IT website's security training -- which is mostly dick-and-jane "don't share passwords, human!" common sense stuff; there's a quiz as part of it. I tell them to complete the security training, while I do something vaguely productive nearby (borrowing a mobile laptop if need be) and wait for questions. At the end, I point out the main IT policies page, note that most of it is common sense, but they should glance through the policies as soon as possible, because they may end up "nailed to the wall with rusty railroad spikes as a warning to others" if they fail to follow them. If they express doubt, I invite them to stop by my desk to see my rusty railroad spikes. (Bottom desk drawer; four of 'em, plus a 6kg sledge with a 40 cm handle. Just in case.)
Once that's done, I then introduce them to the most regularly used software applications: email, Office, calendaring app, the local quick-and-dirty non-Acrobat PDF maker, and so on. The VPN software usually requires a digression into a bad analogy to explain why it's important. ("If you use the dumb-as-a-senator idea that the internet is a series of tubes, the problem is that most of the tubes are transparent, and might let any evil passerby see what's inside. Unless you're willing to give me all of your credit cards now to go shopping with, this is a bad thing. A VPN uses cryptography to run an opaque garden hose over to one of our secure machines, so people can't spy on you until after your traffic leaves our network again.") An overview of the strengths and limitations of whatever POS machine they're stuck working at follows.
I then give them my mixed guru/BOFH lecture:
I have happy users; I am beloved, respected, and feared. Aside from an expresso machine for my office, what more could a geek want?